136 research outputs found

    Edge-based Runtime Verification for the Internet of Things

    Get PDF
    Complex distributed systems such as the ones induced by Internet of Things (IoT) deployments, are expected to operate in compliance to their requirements. This can be checked by inspecting events flowing throughout the system, typically originating from end-devices and reflecting arbitrary actions, changes in state or sensing. Such events typically reflect the behavior of the overall IoT system – they may indicate executions which satisfy or violate its requirements. This article presents a service-based software architecture and technical framework supporting runtime verification for widely deployed, volatile IoT systems. At the lowest level, systems we consider are comprised of resource-constrained devices connected over wide area networks generating events. In our approach, monitors are deployed on edge components, receiving events originating from end-devices or other edge nodes. Temporal logic properties expressing desired requirements are then evaluated on each edge monitor in a runtime fashion. The system exhibits decentralization since evaluation occurs locally on edge nodes, and verdicts possibly affecting satisfaction of properties on other edge nodes are propagated accordingly. This reduces dependence on cloud infrastructures for IoT data collection and centralized processing. We illustrate how specification and runtime verification can be achieved in practice on a characteristic case study of smart parking. Finally, we demonstrate the feasibility of our design over a testbed instantiation, whereupon we evaluate performance and capacity limits of different hardware classes under monitoring workloads of varying intensity using state-of-the-art LPWAN technology

    Models and Methods for Network Selection and Balancing in Heterogeneous Scenarios

    Get PDF
    The outbreak of 5G technologies for wireless communications can be considered a response to the need for widespread coverage, in terms of connectivity and bandwidth, to guarantee broadband services, such as streaming or on-demand programs offered by the main television networks or new generation services based on augmented and virtual reality (AR / VR). The purpose of the study conducted for this thesis aims to solve two of the main problems that will occur with the outbreak of 5G, that is, the search for the best possible connectivity, in order to offer users the resources necessary to take advantage of the new generation services, and multicast as required by the eMBMS. The aim of the thesis is the search for innovative algorithms that will allow to obtain the best connectivity to offer users the resources necessary to use the 5G services in a heterogeneous scenario. Study UF that allows you to improve the search for the best candidate network and to achieve a balance that allows you to avoid congestion of the chosen networks. To achieve these two important focuses, I conducted a study on the main mathematical methods that made it possible to select the network based on QoS parameters based on the type of traffic made by users. A further goal was to improve the computational computation performance they present. Furthermore, I carried out a study in order to obtain an innovative algorithm that would allow the management of multicast. The algorithm that has been implemented responds to the needs present in the eMBMS, in realistic scenarios

    Securing Wireless Communication in Critical Infrastructure: Challenges and Opportunities

    Full text link
    Critical infrastructure constitutes the foundation of every society. While traditionally solely relying on dedicated cable-based communication, this infrastructure rapidly transforms to highly digitized and interconnected systems which increasingly rely on wireless communication. Besides providing tremendous benefits, especially affording the easy, cheap, and flexible interconnection of a large number of assets spread over larger geographic areas, wireless communication in critical infrastructure also raises unique security challenges. Most importantly, the shift from dedicated private wired networks to heterogeneous wireless communication over public and shared networks requires significantly more involved security measures. In this paper, we identify the most relevant challenges resulting from the use of wireless communication in critical infrastructure and use those to identify a comprehensive set of promising opportunities to preserve the high security standards of critical infrastructure even when switching from wired to wireless communication.Comment: Author's version of a paper accepted for publication in Proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2023

    Towards the efficient use of LoRa for wireless sensor networks

    Get PDF
    Since their inception in 1998 with the Smart Dust Project from University of Berkeley, Wireless Sensor Networks (WSNs) had a tremendous impact on both science and society, influencing many (new) research fields, like Cyber-physical System (CPS), Machine to Machine (M2M), and Internet of Things (IoT). In over two decades, WSN researchers have delivered a wide-range of hardware, communication protocols, operating systems, and applications, to deal with the now classic problems of resourceconstrained devices, limited energy sources, and harsh communication environments. However, WSN research happened mostly on the same kind of hardware. With wireless communication and embedded hardware evolving, there are new opportunities to resolve the long standing issues of scaling, deploying, and maintaining a WSN. To this end, we explore in this work the most recent advances in low-power, longrange wireless communication, and the new challenges these new wireless communication techniques introduce. Specifically, we focus on the most promising such technology: LoRa. LoRa is a novel low-power, long-range communication technology, which promises a single-hop network with millions of sensor nodes. Using practical experiments, we evaluate the unique properties of LoRa, like orthogonal spreading factors, nondestructive concurrent transmissions, and carrier activity detection. Utilising these unique properties, we build a novel TDMA-style multi-hop Medium Access Control (MAC) protocol called LoRaBlink. Based on empirical results, we develop a communication model and simulator called LoRaSim to explore the scalability of a LoRa network. We conclude that, in its current deployment, LoRa cannot support the scale it is envisioned to operate at. One way to improve this scalability issue is Adaptive Data Rate (ADR). We develop two ADR protocols, Probing and Optimistic Probing, and compare them with the de facto standard ADR protocol used in the crowdsourced TTN LoRaWAN network. We demonstrate that our algorithms are much more responsive, energy efficient, and able to reach a more efficient configuration quicker, though reaching a suboptimal configuration for poor links, which is offset by the savings caused by the convergence speed. Overall, this work provides theoretical and empirical proofs that LoRa can tackle some of the long standing problems within WSN. We envision that future work, in particular on ADR and MAC protocols for LoRa and other low-power, long-range communication technologies, will help push these new communication technologies to main-stream status in WSNs

    Multi-Protocol Sensor Node for Internet of Things (IoT) Applications

    Get PDF
    This paper will describe the implementation of an end-to-end IoT solution, focusing specifically in the multi-protocol sensor node using Pycom's FiPy board. A performance assessment will be presented, addressing a comparison between the different protocols (LoRa vs. Wi-Fi) in terms radio coverage, timing issues, power consumption/battery usage, among others. Further, it will be investigated the integration onto the sensor node different sensor/actuator circuit blocks for energy metering on industrial machinery as a way to optimize energy efficiency metrics. This will provide a practical use case in the field of Industry 4.0, leading to insights for power quality monitoring

    IoT Middleware Platforms for Smart Energy Systems: An Empirical Expert Survey

    Get PDF
    Middleware platforms are key technology in any Internet of Things (IoT) system, considering their role in managing the intermediary communications between devices and applications. In the energy sector, it has been shown that IoT devices enable the integration of all network assets to one large distributed system. This comes with significant benefits, such as improving energy efficiency, boosting the generation of renewable energy, reducing maintenance costs and increasing comfort. Various existing IoT middlware solutions encounter several problems that limit their performance, such as vendor locks. Hence, this paper presents a literature review and an expert survey on IoT middleware platforms in energy systems, in order to provide a set of tools and functionalities to be supported by any future efficient, flexible and interoperable IoT middleware considering the market needs. The analysis of the results shows that experts currently use the IoT middleware mainly to deploy services such as visualization, monitoring and benchmarking of energy consumption, and energy optimization is considered as a future application to target. Likewise, non-functional requirements, such as security and privacy, play vital roles in the IoT platforms’ performances
    • …
    corecore